The Personal Data Protection Act 2012 (Act) was passed by the Singapore Parliament on 15 October 2012 and came into effect in Singapore on 2 January 2013. A major component of the Act was to put in place general data protection provisions (Data Protection Provisions) that apply to all organisations operating in the private sector in Singapore. Previously, only limited confidentiality obligations existed in Singapore under certain sector specific legislation.
A social media policy is highly desirable for setting clear standards in the workplace, but employer regulation of employees' out of work activities must be reasonable. Read this article to learn how you can use a social media policy for your employees.
This Top Ten examines ten hot-button privacy and data security issues and presents questions to help you gauge whether your organization is at risk, in the U.S. or abroad.
Linking to protected content on a free website does not constitute an unauthorised "communication to the public", according to the decision of the Court of Justice of the European Union (ECJ) (Case C-466/12 Svensson) on 13 February 2014. Read more about this decision in this Ashurst article.
This Top Ten provides an overview of the purpose, development, structure and implications of the the US National Institute of Standards and Technology (NIST) 2013 Preliminary Cybersecurity Framework.
This policy establishes a set of rules and guidelines for any activity and participation in “social media” by all company “users.”
This Quick Counsel will focus on commenting the new data protection regulation in Colombia and its implications for the companies that handle data.
A review of Brazilian data protection law in the context of the insurance industry.
A review of ten issues in-house counsel should consider when creating and maintaining a "Bring Your Own Device" policy.
Google was recently ordered to produce a “smoking gun” email that it claimed to be protected by the attorney-client privilege. The Federal Circuit’s ruling represents a troubling trend. It seems that privileged communications are disappearing in the digital age. This article discusses how to mitigate the undermining of privilege in electronic communications.